HIGHCVE-2023-50233CVSS 8.8

CVE-2023-50233: RCE in Inductive Automation Ignition

Platform

java

Component

ignition

Fixed in

8.1.32

AI Confidence: highNVDEPSS 3.7%Reviewed: May 2026

CVE-2023-50233 is a Remote Code Execution (RCE) vulnerability affecting Inductive Automation Ignition versions 8.1.31 through 8.1.31. This flaw allows an attacker to execute arbitrary code on a vulnerable system by manipulating a user-supplied path within the getJavaExecutable method. User interaction is required, specifically connecting to a malicious server. A patch is available from Inductive Automation to resolve this issue.

Java / Maven

Detect this CVE in your project

Upload your pom.xml file and we'll tell you instantly if you're affected.

Upload pom.xmlSupported formats: pom.xml · build.gradle

Impact and Attack Scenarios

Successful exploitation of CVE-2023-50233 grants an attacker the ability to execute arbitrary code on the affected Ignition server. This could lead to complete system compromise, including data exfiltration, modification, or deletion. The attacker could potentially gain control of the entire industrial control system (ICS) or SCADA environment where Ignition is deployed, leading to significant operational disruption and potential safety hazards. The requirement for user interaction limits the immediate exploitability, but a phishing campaign or social engineering attack could be used to trick users into connecting to a malicious server.

Exploitation Context

CVE-2023-50233 was publicly disclosed on May 3, 2024. The vulnerability's reliance on user interaction may limit its immediate exploitability, but the potential for severe impact warrants careful attention. No known active exploitation campaigns have been publicly reported at the time of writing. The vulnerability is not currently listed on the CISA KEV catalog.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Internet ExposureHigh

EPSS

3.65% (88% percentile)

CISA SSVC

Exploitationnone
Automatableno
Technical Impacttotal

CVSS Vector

THREAT INTELLIGENCE· CVSS 3.1CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H8.8HIGHAttack VectorNetworkHow the attacker reaches the targetAttack ComplexityLowConditions required to exploitPrivileges RequiredNoneAuthentication level needed to attackUser InteractionRequiredWhether a victim must take actionScopeUnchangedImpact beyond the vulnerable componentConfidentialityHighRisk of sensitive data exposureIntegrityHighRisk of unauthorized data modificationAvailabilityHighRisk of service disruptionnextguardhq.com · CVSS v3.1 Base Score
What do these metrics mean?
Attack Vector
Network — remotely exploitable over the internet. No physical or local access required. Widest attack surface.
Attack Complexity
Low — no special conditions required. Attacker can exploit reliably without depending on rare configurations or timing.
Privileges Required
None — unauthenticated. No login or credentials needed to exploit.
User Interaction
Required — victim must take an action: open a file, click a link, or visit a crafted page.
Scope
Unchanged — impact is limited to the vulnerable component itself.
Confidentiality
High — complete confidentiality loss. Attacker can read all data: credentials, keys, personal data.
Integrity
High — attacker can write, modify, or delete any data: databases, config files, or code.
Availability
High — complete crash or resource exhaustion. Full denial of service.

Affected Software

Componentignition
VendorInductive Automation
Affected rangeFixed in
8.1.31 – 8.1.318.1.32

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. Modified
  4. EPSS updated
Unpatched — 751 days since disclosure

Mitigation and Workarounds

The primary mitigation for CVE-2023-50233 is to upgrade to a patched version of Inductive Automation Ignition. Inductive Automation has released a fix, and users should apply it as soon as possible. If immediate patching is not feasible, consider implementing network segmentation to limit the potential impact of a successful exploit. Restrict network access to the Ignition server to only authorized users and systems. Monitor network traffic for suspicious connections to unknown or untrusted servers. While a WAF may not directly prevent this vulnerability, it can help detect and block malicious requests. After upgrade, confirm the fix by attempting to connect to a known malicious server and verifying that the connection is rejected.

How to fix

Actualice Inductive Automation Ignition a una versión posterior a la 8.1.31 para corregir la vulnerabilidad de recorrido de directorio. Esto evitará la ejecución remota de código arbitrario. Asegúrese de que los usuarios no se conecten a servidores no confiables.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2023-50233 — RCE in Inductive Automation Ignition?

CVE-2023-50233 is a Remote Code Execution vulnerability in Inductive Automation Ignition versions 8.1.31–8.1.31, allowing attackers to execute code via a malicious server connection. It has a HIGH severity rating (CVSS 8.8).

Am I affected by CVE-2023-50233 in Inductive Automation Ignition?

If you are running Inductive Automation Ignition versions 8.1.31 through 8.1.31, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as possible.

How do I fix CVE-2023-50233 in Inductive Automation Ignition?

The recommended fix is to upgrade to a patched version of Inductive Automation Ignition. Refer to Inductive Automation's advisory for specific version details and upgrade instructions.

Is CVE-2023-50233 being actively exploited?

No active exploitation campaigns have been publicly reported at this time, but the potential for severe impact warrants immediate attention and mitigation.

Where can I find the official Inductive Automation advisory for CVE-2023-50233?

Please refer to the Inductive Automation security advisory for detailed information and mitigation steps: [https://inductiveautomation.com/security/](https://inductiveautomation.com/security/)

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.